{
	"id": "bb2ac90d-2530-4fe4-87fc-3e9265228813",
	"created_at": "2026-04-06T00:07:48.027699Z",
	"updated_at": "2026-04-10T13:12:54.432152Z",
	"deleted_at": null,
	"sha1_hash": "166a5257472daaea6236883231bef26e352ef0a2",
	"title": "奇安信威胁情报中心",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1196039,
	"plain_text": "奇安信威胁情报中心\r\nArchived: 2026-04-05 21:54:38 UTC\r\n概述\r\n海莲花（OceanLotus）是一个据称东南亚背景的APT组织。该组织最早于2015年5月被天眼实验室披露并\r\n命名，其攻击活动最早可追溯到2012 年4月，攻击目标包括人权代表、异见人士、媒体、银行、海事机\r\n构、海域建设部门、科研院所和航运企业，后扩展到几乎所有重要的组织机构，受害区域涉及东亚、东\r\n南亚、欧洲等地区，持续活跃至今。\r\n本文内容是对海莲花组织在过去一段时间内攻击手法做一个粗略的回顾，不讨论受害单位，报告中涉及\r\n的恶意域名和跳板均已无法访问。\r\n从2020年中开始海莲花组织逐渐放弃了基于鱼叉邮件的投递方式，开始通过渗透的手段对高价值目标进\r\n行攻击活动，经过长时间的跟踪挖掘，发现该组织在入侵和横向移动过程中具备使用0day/Nday漏洞的能\r\n力。\r\n横向移动\r\n相对于海莲花组织相对单一的白利用组件，横向移动过程中使用的脚本可谓种类繁多，本报告仅列出该\r\n组织使用频率最高的几个脚本。\r\n爆破脚本\r\n海莲花早期在内网中使用的爆破脚本如下\r\nhttps://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/\r\nPage 1 of 14\n\n功能较为简单，仅针对445端口下的administrator账户进行爆破\r\n经过数次版本迭代后，增加了对MSSQL、FTP、HTTP的爆破\r\nhttps://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/\r\nPage 2 of 14\n\n增加了对常见端口的扫描\r\nNbtScan脚本\r\n海莲花在横向移动过程中会使用nbtscan对内网进行扫描，利用PS脚本将编码后的Nbtscan注入到\r\nNotepad.exe中。\r\n使用的Nbtscan 1.0.35版本。\r\nhttps://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/\r\nPage 3 of 14\n\nGetinfo脚本\r\n该PS脚本在执行过程中会收集操作系统相关信息、域控信息、ssh状态、RDP状态、反病毒产品、所有用\r\n户名、安装的程序列表、ipconfig、正在运行的服务、网络连接状态、进程列表、磁盘信息、\r\nAdministrator用户下的目录树、C盘根目录树。\r\n最后将上述信息整理成html落在文件系统上，之后会被攻击者加密打包上传到图床网站。\r\n管道注入脚本\r\n在执行过程中从管道中读取Payload，对其进行解密\r\nhttps://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/\r\nPage 4 of 14\n\n之后会随机启动如下进程中一个，并将Shellcode注入该进程中。\r\n- -\r\n进程名 -\r\nmakecab.exe\r\nsystray.exe\r\nw32tm.exe\r\nbootcfg.exe\r\ndiskperf.exe\r\nesentutl.exe\r\ntypeperf.exe\r\n注入代码如下：\r\nEmpire脚本\r\nhttps://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/\r\nPage 5 of 14\n\n海莲花使用Empire框架控制内网主机，搜索目标。最终会在指定目标上释放白利用组件，最终执行\r\ncobaltstrike远控。\r\nMimikatz脚本\r\n在受控主机上执行Mimikatz powershell版本的脚本。\r\n在内存中加载dll的导出函数，抓取本机密码\r\nhttps://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/\r\nPage 6 of 14\n\nCortana beacon\r\nCortana脚本一般作为Cobalt Strike的插件来使用。\r\n0day/Nday\r\n海莲花组织是为数不多的能够结合特定环境定制化开发挖掘0day/Nday漏洞的APT团伙，手段较为高超，\r\n能够发起中等规模的供应链打击。\r\n样本分析\r\nhttps://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/\r\nPage 7 of 14\n\n白利用组件\r\n海莲花组织使用的恶意dll经过数代版本的迭代，其功能一直保持不变，都是用来解密Shellcode，但是 解\r\n密方式 有所不同，大体可以分为如下几类：\r\n1. 读资源节解密Shellcode：\r\n2. 读自身解密Shellcode。\r\nhttps://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/\r\nPage 8 of 14\n\n3. 从data节读取Shellcode。\r\nShellcode在执行过程中一般都会先进行循环解密，\r\nhttps://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/\r\nPage 9 of 14\n\n会解密出后续代码\r\n基于Shellcode执行结果，大体上可以分为机器名加密组件和非机器名加密组件，区别在于机器名加密组\r\n件在执行过程中会读取本机机器名通过机器名对后续Payload进行AES解密。如果机器名错误则无法解密\r\n出后续的cobaltstrike。如果基于 Shellcode行为 进行分类，则可以分为如下几类：\r\n1. 常规类，执行过程中解密cobaltstrike并执行，较为常见不做介绍。\r\n2. Dropper类，执行过程中会将白利用组件释放到%temp%目录下，并创建计划任务。\r\n3. 读文件类，在执行过程中读取特定目录下的文件，第二阶段Shellcode后续对文件内容进行解密。\r\n4. 注入/服务类，在执行过程中启动一个挂起的进程或者创建一个服务，用于执行第二阶段\r\nShellcode。\r\nhttps://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/\r\nPage 10 of 14\n\n最终执行的远控，从家族上来分大体分为两类，一类是cobaltstrike，另一个是Remy Rat，该家族样本使用\r\n频率较低，代码如下：\r\n从 功能 上来分有如下几类：\r\n1. 直连C2类，这种较为常见不做过多赘述。\r\n2. 管道类，创建管道，等待连接。\r\n3. 端口监听类，等待内网其他受控主机连接指定端口。\r\nhttps://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/\r\nPage 11 of 14\n\n挖矿\r\n挖矿组件如下：\r\n被入侵的电脑被创建一个服务，指向SCCreateProcess.exe，服务名为SCCREATEPROCESS:\r\n而SCCreateProcess.exe被执行起来后，会获取到该exe的文件名，然后附件.bat后缀后执行起来：\r\nhttps://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/\r\nPage 12 of 14\n\n而SCCreateProcess.exe.bat文件被执行起来后，会执行起来同目录下的ControlPanel.exe.bat文件：\r\n而ControlPanel.exe.bat文件会通过名字为vmware-authd.exe的挖矿程序，传递矿池和钱包地址进行挖矿操\r\n作。\r\n总结\r\n目前，基于奇安信威胁情报中心的威胁情报数据的全线产品，包括奇安信威胁情报平台（TIP）、天擎、\r\n天眼高级威胁检测系统、奇安信NGSOC、奇安信态势感知等，都已经支持对此类攻击的精确检测。\r\nhttps://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/\r\nPage 13 of 14\n\nSource: https://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/\r\nhttps://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/\r\nPage 14 of 14",
	"extraction_quality": 1,
	"language": "ZH",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://ti.qianxin.com/blog/articles/Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep/"
	],
	"report_names": [
		"Operation-OceanStorm:The-OceanLotus-hidden-under-the-abyss-of-the-deep"
	],
	"threat_actors": [
		{
			"id": "af509bbb-8d18-4903-a9bd-9e94099c6b30",
			"created_at": "2023-01-06T13:46:38.585525Z",
			"updated_at": "2026-04-10T02:00:03.030833Z",
			"deleted_at": null,
			"main_name": "APT32",
			"aliases": [
				"OceanLotus",
				"ATK17",
				"G0050",
				"APT-C-00",
				"APT-32",
				"Canvas Cyclone",
				"SeaLotus",
				"Ocean Buffalo",
				"OceanLotus Group",
				"Cobalt Kitty",
				"Sea Lotus",
				"APT 32",
				"POND LOACH",
				"TIN WOODLAWN",
				"Ocean Lotus"
			],
			"source_name": "MISPGALAXY:APT32",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "870f6f62-84f5-48ca-a18e-cf2902cd6924",
			"created_at": "2022-10-25T15:50:23.303818Z",
			"updated_at": "2026-04-10T02:00:05.301184Z",
			"deleted_at": null,
			"main_name": "APT32",
			"aliases": [
				"APT32",
				"SeaLotus",
				"OceanLotus",
				"APT-C-00",
				"Canvas Cyclone"
			],
			"source_name": "MITRE:APT32",
			"tools": [
				"Mimikatz",
				"ipconfig",
				"Kerrdown",
				"Cobalt Strike",
				"SOUNDBITE",
				"OSX_OCEANLOTUS.D",
				"KOMPROGO",
				"netsh",
				"RotaJakiro",
				"PHOREAL",
				"Arp",
				"Denis",
				"Goopy"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "5da6b5fd-1955-412a-81aa-069fb50b6e31",
			"created_at": "2025-08-07T02:03:25.116085Z",
			"updated_at": "2026-04-10T02:00:03.668978Z",
			"deleted_at": null,
			"main_name": "TIN WOODLAWN",
			"aliases": [
				"APT32 ",
				"Cobalt Kitty",
				"OceanLotus",
				"WOODLAWN "
			],
			"source_name": "Secureworks:TIN WOODLAWN",
			"tools": [
				"Cobalt Strike",
				"Denis",
				"Goopy",
				"JEShell",
				"KerrDown",
				"Mimikatz",
				"Ratsnif",
				"Remy",
				"Rizzo",
				"RolandRAT"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "2439ad53-39cc-4fff-8fdf-4028d65803c0",
			"created_at": "2022-10-25T16:07:23.353204Z",
			"updated_at": "2026-04-10T02:00:04.55407Z",
			"deleted_at": null,
			"main_name": "APT 32",
			"aliases": [
				"APT 32",
				"APT-C-00",
				"APT-LY-100",
				"ATK 17",
				"G0050",
				"Lotus Bane",
				"Ocean Buffalo",
				"OceanLotus",
				"Operation Cobalt Kitty",
				"Operation PhantomLance",
				"Pond Loach",
				"SeaLotus",
				"SectorF01",
				"Tin Woodlawn"
			],
			"source_name": "ETDA:APT 32",
			"tools": [
				"Agentemis",
				"Android.Backdoor.736.origin",
				"AtNow",
				"Backdoor.MacOS.OCEANLOTUS.F",
				"BadCake",
				"CACTUSTORCH",
				"CamCapture Plugin",
				"CinaRAT",
				"Cobalt Strike",
				"CobaltStrike",
				"Cuegoe",
				"DKMC",
				"Denis",
				"Goopy",
				"HiddenLotus",
				"KOMPROGO",
				"KerrDown",
				"METALJACK",
				"MSFvenom",
				"Mimikatz",
				"Nishang",
				"OSX_OCEANLOTUS.D",
				"OceanLotus",
				"PHOREAL",
				"PWNDROID1",
				"PhantomLance",
				"PowerSploit",
				"Quasar RAT",
				"QuasarRAT",
				"RatSnif",
				"Remy",
				"Remy RAT",
				"Rizzo",
				"Roland",
				"Roland RAT",
				"SOUNDBITE",
				"Salgorea",
				"Splinter RAT",
				"Terracotta VPN",
				"Yggdrasil",
				"cobeacon",
				"denesRAT",
				"fingerprintjs2"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434068,
	"ts_updated_at": 1775826774,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/166a5257472daaea6236883231bef26e352ef0a2.pdf",
		"text": "https://archive.orkl.eu/166a5257472daaea6236883231bef26e352ef0a2.txt",
		"img": "https://archive.orkl.eu/166a5257472daaea6236883231bef26e352ef0a2.jpg"
	}
}